首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
一种基于交换机配置的网络优化方案及应用   总被引:3,自引:1,他引:2  
随着校园网各种应用的投入及网点的不断增加,校园网内各种问题也日趋凸显,校园网安全面临严重威胁。本文针对校园网现状,提出一种基于交换机配置的校园网优化方案,并给与具体的实施,为各高校校园网的优化提供一些参考与帮助。  相似文献   

2.
对于中等职业学校来说,校园网已经成为师生之间日常教学活动中极为重要的一部分,并且通过不断的应用各种校园网络系统,对于校园网来说,安全稳定也开始变得更加重要。随着校园网应用用户的不断增多以及越来越多不安全因素的发生,在使用校园网的时候也遇到了许多问题。本文详细地分析了中等职业学校校园网网络安全情况,供相关读者参考。  相似文献   

3.
校园网使教师和同学们方便有效地利用学校的各种资源,但是由于校园网用户量的不断增加,校园网应用的不断增多,校园网的安全越来越受到人们的重视。本文分析了校园网面临的安全问题,并提出了相应的解决措施。  相似文献   

4.
随着互联网的高速发展,校园网在地方高校的教学、科研及管理等各个方面发挥着越来越重要的作用。随着校园网内应用的不断增加和深入,网络规模的扩大,校园网体系的日益复杂,校园网所面临的风险和安全威胁也日益突出。本文从地方校园网的特点、发展现状及校园网安全体系中存在的问题进行分析,建立起一套真正适合地方高校校园网的安全体系。  相似文献   

5.
目前大部分国内高校的出口链路已经有多种选择,出口带宽也逐年提高,而针对校外访问校园网内部各种资源的研究与应用实践不多,该文对基于F5的多链路接入负载均衡技术在校园网外部访问校园网内资源方式的应用做了研究和实践。  相似文献   

6.
冯乐 《福建电脑》2010,26(8):84-85,83
校园网作为高校信息化建设的基础平台,重要性日益显现。由于校园网应用的不断增多,校园网用户量的不断增加,校园网面临的安全问题日益突出。面对各种层出不穷的网络威胁,本文详细分析了校园网现有的安全体系可能存在的问题,提出了针对性的解决方法,构建了一种适合校园网的网络安全防御体系,并阐述了该体系的构架及工作流程。  相似文献   

7.
随着网络技术的不断发展,对于校园网的研究逐渐引起了大家的广泛关注。本文以此为研究对象,详细分析了与此相关的内容。文章主要介绍了QoS、组播、VLAN、Web eache server等技术在校园网中应用的优化。希望本文的研究能够对校园网的建设提供指导和帮助,对于相关领域的研究也能起到抛砖引玉的作用。  相似文献   

8.
高校校园网带宽优化管理的实践与探讨   总被引:1,自引:0,他引:1  
随着校园网用户增多和P2P应用的不断丰富,校园网带宽资源也日益紧张。如何在有限的资金条件对现有的带宽资源进行优化是高校校园网建设中需要重点考虑的问题。该文结合实例对校园网带宽优化管理方案进行了探讨。  相似文献   

9.
目的:探讨校园网组建起来后,所面临的各种问题,并提供有效的解决方案。方法:从网络的结构性,网络的可靠性,网络的安全性三个方面进行分析,并提出相应的优化策略。结果:提高了校园网运行的可靠性、安全性和效率。结论:采用路径分析、关联规则待方法对网络进行优化,可以提高校园网的运行效率以及安全性。  相似文献   

10.
校园网安全随着网络规模的不断扩大,应用用户不断增加,各种安全问题也越来越突出。本文以某高校校园网为例,通过对其网络安全现状进行分析,常用的网络安全攻击,设计出更适合该高校校园网的安全防御系统,提出了构建网络信息安全统一管理平台,以便解决当前该院以及其他学校类似的网络安全问题,以此达到提高工作效率,减少维护校园网络安全所消耗的人力资源和物力资源的目的。  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号